<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site IPSEC Clarification in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576453#M115696</link>
    <description>&lt;P&gt;Yeah, that's a good point. I am going to be more largely affected by an outage here at my office than at the other end, simply because we don't access the remote end every day at every location, but we access "some" locations every day. Perhaps the more economical solution is to build gateways and tunnels from 2 of my IPs to one at the remote end, that way I don't lose access to every location when the one ISP goes down. It doesn't happen often, but when it does I don't want to lose access entirely.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2024 14:12:12 GMT</pubDate>
    <dc:creator>MattPardue</dc:creator>
    <dc:date>2024-02-07T14:12:12Z</dc:date>
    <item>
      <title>Site to Site IPSEC Clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576300#M115676</link>
      <description>&lt;P&gt;I'm moving from a Cisco ASA to a Palo Alto firewall for the first time. I've imported the config to Expedition and am prepping it for import to the firewall, but I noticed only the first of my crypto peers for each tunnel was imported to an IKE gateway. After some research it seems I'm going to need a separate IKE gateway for each remote peer as well as for each local interface from which my tunnel needs to connect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, for instance, assuming I have two WAN interfaces on my local firewall and the remote end has two WAN IPs, and on each side we're connecting a single subnet to the tunnel, then I would need the following IKE gateways:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Local WAN1 -&amp;gt; Remote WAN1&lt;/P&gt;
&lt;P&gt;Local WAN1 -&amp;gt; Remote WAN2&lt;/P&gt;
&lt;P&gt;Local WAN2 -&amp;gt; Remote WAN1&lt;/P&gt;
&lt;P&gt;Local WAN2 -&amp;gt; Remote WAN2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Expedition I can't seem to add an IKE gateway to test, but on the firewall if I add each of the gateways mentioned above then I presume that adds tunnel interfaces for each, then I just add the tunnel to the corresponding trust zone?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does that all sound right, or am I completely botching this? Is there a better way to create tunnels that can utilize either of my WAN interfaces and multiple peer IPs?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for any help anybody can provide and I apologize if I'm missing something obvious here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 18:03:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576300#M115676</guid>
      <dc:creator>MattPardue</dc:creator>
      <dc:date>2024-02-06T18:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPSEC Clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576420#M115688</link>
      <description>&lt;P&gt;you are right&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;an IKE Gateway needs to be created for each IP pair so if you have 2 ISPs and the remote has 2 isps and you want to full mesh all pairs, you would need 4 ike gateway objects and 4 ipsec tunnel objects&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand: Does it make sense to full mesh all pairs, is it likely both sides will have a simultaneous outage on one of their ISPs ?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 10:13:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576420#M115688</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-02-07T10:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPSEC Clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576453#M115696</link>
      <description>&lt;P&gt;Yeah, that's a good point. I am going to be more largely affected by an outage here at my office than at the other end, simply because we don't access the remote end every day at every location, but we access "some" locations every day. Perhaps the more economical solution is to build gateways and tunnels from 2 of my IPs to one at the remote end, that way I don't lose access to every location when the one ISP goes down. It doesn't happen often, but when it does I don't want to lose access entirely.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 14:12:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-ipsec-clarification/m-p/576453#M115696</guid>
      <dc:creator>MattPardue</dc:creator>
      <dc:date>2024-02-07T14:12:12Z</dc:date>
    </item>
  </channel>
</rss>

